Install MySQL1. Download the MySQL Installation FileThe following two files are required to install MYSQL:
MySQL-server-5.1.7-0.i386.rpm To: http://dev.mysql.com/downloads/mysql/5.1.html, open this webpage and click"Linux x86 generic RPM
Han Ligang Teacher Video teaching website http://www.91xueit.comMr. Han QQ458717185No. 01. mysql User and Rights managementMySQL permissions control is controlled by two steps, can not connect (authenticate user identity), what action (verify user
MySQLStudy-MySQL User and permission management MySQL server uses the MySQL permission table to control user access to the database. the MySQL permission table is stored in the mysql database and initialized by the mysql_install_db script. These
1. download MySql
1. download MySql
Open http://www.mysql.com/downloads/mysql/#downloads download in browser
My downloaded version is Red Hat 5 version of http://www.mysql.com/downloads/mirror.php? Id = 407552
Upload the file to the server, or
1. Full backup and incremental backup 1.1 full-scale backupFull-volume data is all the data in the database, and a full backup is the backup of all the data in the database.Back Up all libraries:mysqldump -uroot -p123456 -S /data/3306/mysql.sock -F -
After installing MySQL, configure the environment variables and then
Input MySQL
Go to MySQL
Then you can
Use MySQL;
Select * from user;
To view all users;
Execute the script file in MySQL:
Mysql> source XXX. SQL;
1.1 add users in two ways: (convert)
**************************************** ******************
The first part is to build a multi-mysql service on a server.
**************************************** ******************
I. xuyan
There is a mysqld_multi command in Mysql that can be used
MySQL has become one of the most widely used databases on the network, especially for Web applications. it occupies the absolute advantage of small and medium applications. All of this comes from its small and easy-to-use, secure and effective, open
User Rights Management mainly has the following functions:1. You can restrict which libraries a user accesses, which tables2. You can restrict which tables the user performs for select, CREATE, delete, delete, alter, etc.3. The IP or domain name
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.